Adversary model

Results: 85



#Item
71Ciphertext indistinguishability / Elliptic curve / Adversary model / Mathematics / Applied mathematics / Computer science / Analysis of algorithms / Vehicle Identification Number / Advantage

Cryptographic treatment of CryptDB’s Adjustable Join Raluca Ada Popa and Nickolai Zeldovich MIT CSAIL March 25, [removed]

Add to Reading List

Source URL: people.csail.mit.edu

Language: English
72University of Santo Tomas / Federal Rules of Bankruptcy Procedure / Adversary model / United States bankruptcy law / Education in the Philippines / International Council of Universities of Saint Thomas Aquinas

SELF-CALENDARING INSTRUCTIONS FOR JUDGE MEREDITH A. JURY COURTROOM # 301 ****UPDATED: [removed]

Add to Reading List

Source URL: www.cacb.uscourts.gov

Language: English - Date: 2014-05-23 14:54:51
73Recommender system / Adversary model / Netflix / Data privacy / Business / Computer science / Computing / Analysis of algorithms / Crowdsourcing / Netflix Prize

Robust De-anonymization of Large Datasets (How to Break Anonymity of the Netflix Prize Dataset) Arvind Narayanan and Vitaly Shmatikov arXiv:cs/0610105v2 [cs.CR] 22 Nov 2007

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2008-02-04 22:44:12
74Operations security / Intelligence / United States Special Operations Command / Adversary model / Military intelligence / Intelligence cycle security / Espionage / National security / Security

What Can You Do? Family members may be targeted by an adversary as a source of critical information. The most important thing you can do is be aware of and understand possible threats. Do not communicate critical informa

Add to Reading List

Source URL: www.socom.mil

Language: English - Date: 2014-06-18 14:48:01
75Recommender system / Adversary model / Internet privacy / Business / Computing / Computer science / Differential privacy / Crowdsourcing / Netflix Prize / Netflix

Robust De-anonymization of Large Sparse Datasets Arvind Narayanan and Vitaly Shmatikov The University of Texas at Austin Abstract

Add to Reading List

Source URL: www.cs.utexas.edu

Language: English - Date: 2008-03-08 10:27:18
76Crime prevention / National security / Trusted computing base / Information security / Cryptography / Actor model / System / Scientific method / Adversary / Security / Computer security / Science

NSF/IARPA/NSA Workshop on the Science of Security David Evans (PI), University of Virginia Workshop Report The NSF/IARPA/NSA Workshop on the Science of Security was held[removed]November 2008 in Berkeley, CA. It brought to

Add to Reading List

Source URL: sos.cs.virginia.edu

Language: English - Date: 2009-02-10 02:36:26
77Computer networking / Online algorithms / Data transmission / Adversary model / Analysis of algorithms / Packet switching / Routing / Shortest path problem / Linear programming / Computing / Theoretical computer science / Mathematics

Effective routing and scheduling in adversarial queueing networks Jay Sethuraman ∗ Chung-Piaw Teo

Add to Reading List

Source URL: www.columbia.edu

Language: English - Date: 2004-08-26 16:34:07
78Network architecture / Routing / Cryptographic software / Onion routing / Tor / Static routing / Router / Proxy server / Adversary model / Computing / Internet privacy / Internet

Trust-based Anonymous Communication: Adversary Models and Routing Algorithms ∗ Aaron Johnson

Add to Reading List

Source URL: www.ohmygodel.com

Language: English - Date: 2011-09-22 15:14:46
79Tor / Onion routing / Peer-to-peer / Traffic analysis / Proxy server / Adversary model / Email / BitTorrent / Adversary / Computing / Internet privacy / Internet

Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries

Add to Reading List

Source URL: cryptome.org

Language: English - Date: 2013-09-01 20:12:28
80Tor / Onion routing / Peer-to-peer / Traffic analysis / Proxy server / Adversary model / Email / BitTorrent / Adversary / Computing / Internet privacy / Internet

Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries Aaron Johnson1

Add to Reading List

Source URL: www.ohmygodel.com

Language: English - Date: 2013-09-05 11:49:46
UPDATE